'''fiwalk''' is a program that processes a disk image using the SleuthKit library and outputs its results in Digital Forensics XML, the Attribute Relationship File Format (ARFF) format used by the Weka Datamining Toolkit, or an easy-to-read textual format.

+

−

The fiwalk source code comes with fiwalk.py, a Python module that makes it easy to create digital forensics programs. Also included are several demonstration programs that use fiwalk.py:

+

1. Open Blackberry’s Desktop Manager<br/>

−

;iblkfind.py

+

2. Click “Options” then “Connection Options” <br/>

−

:Given a disk block in a disk image, this program tells you which file(s) map that sector.

+

[[Image:4.JPG]]<br/>

−

;icarvingtruth.py

+

4. Select “USB-PIN: 2016CC12” for connection<br/>

−

:Given two or more images of the same disk at different points in time, this program files that are present in the earlier images that can only be recovered from the later images using file carving techniques.

+

[[Image:1.JPG]]<br/>

−

;idifference.py

+

5. Click “Detect”, then it should show a dialog box saying it found the device<br/>

−

:Given two or more images of the same disk at different points in time, this program tells you what changes took place between each one.

+

6. Click "OK" to return to the main menu<br/>

−

;iextract.py

+

7. Double click “Backup and Restore”<br/>

−

:Allows the extraction of files that match a particular pattern.

+

[[Image:2.JPG]] <br/>

−

;igrep.py

+

8. Click "Backup"<br/>

−

:Searches every file in a disk image for a particular string. When found, prints, the file and the offset within the file that the string was found.

+

[[Image:5.JPG]]<br/>

−

;ihistogram.py

+

9. Save the .ipd file<br/>

−

:Prints a histogram of file types found in the disk image.

+

[[Image:3.JPG]]<br/>

−

;imap.py

+

<br>

−

:Displays a “map” of where files are present in the disk image.

+

−

;imicrosoft_redact.py

+

−

:Modifies a disk image of a bootable Microsoft operating system so that the image can no longer be boot and so that any Microsoft copyrighted file in the \Windows directory cannot be executed. This allows the disk image of a Microsoft operating system to be distributed without implicitly violating Microsoft’s copyright.